SEC504: Hacker Tools, Techniques, and Incident Handling

Experience SANS training through course previews.
Learn MoreLet us help.
Contact usConnect, learn, and share with other cybersecurity professionals
Engage, challenge, and network with fellow CISOs in this exclusive community of security leaders
Become a member for instant access to our free resources.
Sign UpMission-focused cybersecurity training for government, defense, and education
Explore industry-specific programming and customized training solutions
Sponsor a SANS event or research paper
We're here to help.
Contact UsApply your credits to renew your certifications
Attend a live, instructor-led class at a location near you or remotely, or train on your time over 4 months
Course material is geared for cyber security professionals with hands-on experience
Apply what you learn with hands-on exercises and labs
Integrate strategic and tactical approaches to level up enterprise vulnerability management programs while addressing infrastructure and cloud environment challenges.
Excellent labs. More fun than I thought possible with vulnerability management.
This course equips security professionals with proven strategies to mature vulnerability management programs and transition from merely identifying vulnerabilities to successfully treating them. Using the Prepare, Identify, Analyze, Communicate, and Treat (PIACT) Model, you'll learn to think strategically about vulnerability management while receiving practical guidance to overcome common challenges. The course addresses the complexities of managing vulnerabilities across traditional infrastructure, applications, and cloud environments.
Through 16 hands-on exercises and the Cyber42 leadership simulation game, you'll develop both strategic thinking and tactical skills to prioritize unblocked vulnerabilities, communicate risk effectively, and implement remediation techniques that work. This vulnerability management training course helps security professionals adapt their practices as organizations adopt cloud services and implement DevOps methodologies.
David is a security consultant with 20+ years of experience in vulnerability management, application security, cloud security, and DevOps, a co-author of LDR516: Building and Leading Vulnerability Management Programs, as well as an instructor for SEC540: Cloud Security and DevSecOps Automation.
Read more about David HazarWith a career spanning over 20 years that has included working in network design, IP telephony, service development, security and project management, Jonathan has a deep technical background that provides a wealth of information he draws upon when teaching.
Read more about Jonathan RistoExplore the course syllabus below to view the full range of topics covered in LDR516: Building and Leading Vulnerability Management Programs.
This section examines the importance of vulnerability management and introduces cloud service impacts. You'll explore asset management as a foundation for effective vulnerability management and learn how contextual information enhances program success.
This section addresses identification challenges and architectural design across infrastructure and applications. You'll learn about scanning strategies, permission management, and responsible disclosure practices to enhance vulnerability detection capabilities.
This section teaches techniques to analyze vulnerability data, reduce inaccuracies, and identify root causes. You'll learn prioritization strategies, develop meaningful metrics, and create targeted reports to drive remediation action.
This section explores remediation processes, technologies, and integration with change management. You'll examine cloud challenges, application vulnerability remediation, and alternative treatments when traditional methods aren't viable.
This section synthesizes course learnings and focuses on program enhancement. You'll discover strategies to make vulnerability management engaging, identify key stakeholders, and build mature vulnerability management programs.
Responsible for conducting independent comprehensive assessments of management, operational, and technical security controls and control enhancements employed within or inherited by a system to determine their overall effectiveness.
Explore learning pathResponsible for assessing systems and networks to identify deviations from acceptable configurations, enclave policy, or local policy. Measure effectiveness of defense-in-depth architecture against known vulnerabilities.
Explore learning pathWhen purchasing a live, instructor-led course, add 4 months of online access. View price in the info icons below.
Add 6 months of hands-on skills practice. Add to your cart when purchasing your course.
It is excellent for people who are creating and implementing their VMP. The course is detailed, thorough, and sets clear expectations for a successful program.
Great class full of new info for beginners and experienced VM folks. Thank you!
I have really enjoyed the discussions around these labs and hearing similarities from other users. I think this format for labs is fun.
Get feedback from the world’s best cybersecurity experts and instructors
Choose how you want to learn - online, on demand, or at our live in-person training events
Get access to our range of industry-leading courses and resources